Methods of increasing the security of the Internet of Things based on blockchain technologies

DOI: 10.31673/2409-7292.2020.023236

Authors

  • О. Г. Маслов, (Maslov O. G.) State University of Telecommunications, Kyiv
  • О. В. Кітура, (Kitura O. V.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2020.023236

Abstract

Ways of unauthorized receipt of information in information and telecommunication systems are shown. The three stages of the process of preventing or reducing the risks of dangers in information and telecommunication systems are shown. Threats to information security in information and telecommunication systems and their classification are considered. Methods and technologies for counteracting information threats in information and telecommunication systems are given. The conclusion is made about the need to monitor new technological solutions to ensure information security in information and telecommunication systems.

Keywords: local network, information and telecommunication system, information with limited access, object of information activity, information security, confidentiality.

References
1. Гайворонський М.В., Новіков К.А. Безпека інформаційно-комунікаційних систем / – К: Вид. група BHV, 2009. –608 с.
2. https:// https://docs.microsoft.com/ru-ru/azure/security/develop/threat-modeling-tool-threats [електронний ресурс].
3. Чаплигіна М.П. Показатели угроз безопасности модели OSI / - М: Молодий вчений, 2015. - № 13(93). – С. 214-217. – URL: https://moluch.ru/arhive/93\20668.
4. https:// https://searchinform.ru/informatsionnaya-bezopasnost/dlp-sistemy

Published

2020-10-11

Issue

Section

Articles